Test Study 2 Flashcards

1
Q

In networking, what is DTE?

A

Data terminal equipment, typically customer equipment that needs communication services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is 802.15.1

A

The standard for PAN or bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a popular name for a PAN

A

bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is shibboleth?

A

An SSO standard based on SAML. It is open source and capable of working with many identity providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a key stretching algorithm commonly used by Linux?

A

Bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a routing protocol that points packets in the lowest cost direction?

A

RIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a group of standards to assist in automated assessments?

A

SCAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What routing protocol is simple and indicates the best initial direction for each packet?

A

Distance vector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is HAVAL?

A

A broken hash algorithm with variable hash lengths from 128 to 256 bits that allows the user to specify the number of rounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a green bar certificate?

A

An extended validation certificate, requires legal entity proof of the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some characteristics of compartmentalized security mode?

A
All users require NDA
All info requires clearance
Some info requires approval
Some info is need to know
All users can access some information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a business resumption plan?

A

Procedures and checklists to resume normal operations after a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What would a list of resources, actions, and information kept ready for a specific emergency be called?

A

COOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is required for proof of a domain validation certificate?

A

Ownership of the DNS records, whois, or the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What hash algorithm allows you to specify length and number of rounds?

A

HAVAL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the standard for bluetooth?

A

802.15.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the standard for packet-switching on older telephone services?

A

X.25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is distance vector?

A

A simple protocol that indicates the best initial direction for each packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Frame Relay?

A

A packet switched service that can handle multiple virtual circuits and a variety of network types. It has a committed minimum data rate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is EIGRP?

A

A cisco made, distance vector based routing protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does Classifying do?

A

Classifying sets the sensitivity levels for data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In networking, what is DCE?

A

Data communications equipment, typically telephone equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does Categorizing do?

A

Identifies assets with regard to their impact if lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the characteristics of OSPF?

A

link state routing, where each device creates a map of the network and chooses the most efficient routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the term for the threshold established to prevent logging every event?

A

Clipping level.

26
Q

What is a standard for non-repudiation and digital signing?

A

DSA

27
Q

What is a SCAP?

A

security content automation protocol - a group of standards to assist in automated assessment and the management and identification of vulnerabilities.

28
Q

Which RAID levels can survive 2 drives failing?

A

RAID 6 and RAID 1+0 (10)

29
Q

What is another name for bluetooth?

A

PAN or personal area network

30
Q

How many bits of length is HAVAL?

A

128 to 256

31
Q

What is clipping level?

A

The threshold for established logging and alerting to avoid logging every single event.

32
Q

What does transposition encryption do?

A

Rearranges the letters without changing them?

33
Q

What are the procedures and checklists to resume normal operations after a disaster called?

A

Business resumption plan

34
Q

What is Bcrypt?

A

A key stretching algorithm commonly used by Linux

35
Q

What is DSA?

A

Digital signing algorithm, provides non-repudiation.

36
Q

In encryption, what is a short lived item only used for a little while and then discarded and regenerated that is also a helpful protection from eavesdropping?

A

Session key

37
Q

What renders a compromised system completely safe?

A

Data sanitization

38
Q

What is data diddling?

A

An act of interfering with data at the entry point, usually by a malicious insider.

39
Q

What are the characteristics of dedicated security mode?

A
All require NDA
Clearance required for all information
Approval required for all information
All information is need to know
All users can access all information
40
Q

What kind of encryption rearranges letters without changing them?

A

Transposition

41
Q

What is EAP?

A

Extensible authentication protocol, a framework for authentication that you can build upon.

42
Q

What is X.25?

A

Standard for packet switched networks using older telephone services.

43
Q

How many drives can fail in a RAID 6 and it still remain viable?

A

2

44
Q

What is a development method that relies on creating components or functions in parallel as if they were mini projects?

A

RAD

45
Q

What malicious act is generally from an insider having to do with data entry?

A

Data diddling.

46
Q

What is a routing protocol where each device maps the network to choose the most efficient route?

A

OSPF

47
Q

What are the characteristics of multilevel security mode?

A
NDA for all
Some data requires clearance
Some data requires approval
Some data is need to know
All users can access some information
48
Q

What is a set of standards that are flexible and adaptable with sets of policies and recommendations?

A

ISO27000

49
Q

What is an open source SSO based on SAML?

A

Shibboleth.

50
Q

What is the process to recover and protect the IT infrastructure in the even of a disaster called?

A

Disaster recovery plan.

51
Q

What is a COOP?

A

Continuity of operations plan - gathering of resources, actions, information, and procedures that are kept in readiness to address specific emergencies.

52
Q

In most to least strict, list the data security modes.

A

Dedicated, System High, Compartmented, Multilevel

53
Q

What is an authentication protocol framework?

A

EAP

54
Q

What development method relies on customer interaction and feedback?

A

AGILE

55
Q

What type of service can handle a variety of network types and has a minimum, committed data rate?

A

Frame relay

56
Q

Which type of certification validation requires legal entity proof of the owner?

A

Extended validation, or green bar.

57
Q

What is RIP?

A

A distance vector routing protocol that points packets int he lowest cost direction for efficiency.

58
Q

What is a disaster recovery plan?

A

The process to recover and protect the IT infrastructure in the vent of a disaster.

59
Q

What are the characteristics of system high security mode?

A
All users require NDA
All data requires clearance
All data requires approval 
Some information is need to know, 
All users can access some data
60
Q

What is a session key?

A

A key used for short periods of time, usually a single session, and should no longer be in use when its broken.

61
Q

What are the four data security modes?

A

Dedicated
System high
multilevel
compartmented